blob: 34fa2e4b7c515896d5aa1e89032edf743e7a5c67 [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/browser/ssl/ssl_policy_backend.h"
#include "content/browser/frame_host/navigation_controller_impl.h"
#include "content/public/browser/browser_context.h"
#include "content/public/browser/ssl_host_state_delegate.h"
namespace content {
SSLPolicyBackend::SSLPolicyBackend(NavigationControllerImpl* controller)
: ssl_host_state_delegate_(
controller->GetBrowserContext()->GetSSLHostStateDelegate()),
controller_(controller) {
DCHECK(controller_);
}
void SSLPolicyBackend::HostRanInsecureContent(const std::string& host, int id) {
if (ssl_host_state_delegate_)
ssl_host_state_delegate_->HostRanInsecureContent(
host, id, SSLHostStateDelegate::MIXED_CONTENT);
SSLManager::NotifySSLInternalStateChanged(controller_->GetBrowserContext());
}
bool SSLPolicyBackend::DidHostRunInsecureContent(const std::string& host,
int pid) const {
if (!ssl_host_state_delegate_)
return false;
return ssl_host_state_delegate_->DidHostRunInsecureContent(
host, pid, SSLHostStateDelegate::MIXED_CONTENT);
}
void SSLPolicyBackend::HostRanContentWithCertErrors(const std::string& host,
int id) {
if (ssl_host_state_delegate_)
ssl_host_state_delegate_->HostRanInsecureContent(
host, id, SSLHostStateDelegate::CERT_ERRORS_CONTENT);
SSLManager::NotifySSLInternalStateChanged(controller_->GetBrowserContext());
}
bool SSLPolicyBackend::DidHostRunContentWithCertErrors(const std::string& host,
int pid) const {
if (!ssl_host_state_delegate_)
return false;
return ssl_host_state_delegate_->DidHostRunInsecureContent(
host, pid, SSLHostStateDelegate::CERT_ERRORS_CONTENT);
}
void SSLPolicyBackend::RevokeUserAllowExceptions(const std::string& host) {
if (!ssl_host_state_delegate_)
return;
ssl_host_state_delegate_->RevokeUserAllowExceptions(host);
}
bool SSLPolicyBackend::HasAllowException(const std::string& host) {
if (!ssl_host_state_delegate_)
return false;
return ssl_host_state_delegate_->HasAllowException(host);
}
void SSLPolicyBackend::AllowCertForHost(const net::X509Certificate& cert,
const std::string& host,
net::CertStatus error) {
if (ssl_host_state_delegate_)
ssl_host_state_delegate_->AllowCert(host, cert, error);
}
SSLHostStateDelegate::CertJudgment SSLPolicyBackend::QueryPolicy(
const net::X509Certificate& cert,
const std::string& host,
net::CertStatus error,
bool* expired_previous_decision) {
return ssl_host_state_delegate_ ?
ssl_host_state_delegate_->QueryPolicy(
host, cert, error, expired_previous_decision) :
SSLHostStateDelegate::DENIED;
}
} // namespace content